--- 1/draft-ietf-detnet-use-cases-13.txt 2018-02-23 10:13:40.451989880 -0800
+++ 2/draft-ietf-detnet-use-cases-14.txt 2018-02-23 10:13:40.735996564 -0800
@@ -1,54 +1,18 @@
Internet Engineering Task Force E. Grossman, Ed.
Internet-Draft DOLBY
-Intended status: Informational C. Gunther
-Expires: March 22, 2018 HARMAN
- P. Thubert
- P. Wetterwald
- CISCO
- J. Raymond
- HYDRO-QUEBEC
- J. Korhonen
- BROADCOM
- Y. Kaneko
- Toshiba
- S. Das
- Applied Communication Sciences
- Y. Zha
- HUAWEI
- B. Varga
- J. Farkas
- Ericsson
- F. Goetz
- J. Schmitt
- Siemens
- X. Vilajosana
- Worldsensing
- T. Mahmoodi
- King's College London
- S. Spirou
- Intracom Telecom
- P. Vizarreta
- Technical University of Munich, TUM
- D. Huang
- ZTE Corporation, Inc.
- X. Geng
- HUAWEI
- D. Dujovne
- UDP
- M. Seewald
- CISCO
- September 18, 2017
+Intended status: Informational February 23, 2018
+Expires: August 27, 2018
Deterministic Networking Use Cases
- draft-ietf-detnet-use-cases-13
+ draft-ietf-detnet-use-cases-14
Abstract
This draft documents requirements in several diverse industries to
establish multi-hop paths for characterized flows with deterministic
properties. In this context deterministic implies that streams can
be established which provide guaranteed bandwidth and latency which
can be established from either a Layer 2 or Layer 3 (IP) interface,
and which can co-exist on an IP network with best-effort traffic.
@@ -71,200 +35,200 @@
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
- This Internet-Draft will expire on March 22, 2018.
+ This Internet-Draft will expire on August 27, 2018.
Copyright Notice
- Copyright (c) 2017 IETF Trust and the persons identified as the
+ Copyright (c) 2018 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
- 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 6
- 2. Pro Audio and Video . . . . . . . . . . . . . . . . . . . . . 7
- 2.1. Use Case Description . . . . . . . . . . . . . . . . . . 7
- 2.1.1. Uninterrupted Stream Playback . . . . . . . . . . . . 8
- 2.1.2. Synchronized Stream Playback . . . . . . . . . . . . 8
- 2.1.3. Sound Reinforcement . . . . . . . . . . . . . . . . . 9
- 2.1.4. Deterministic Time to Establish Streaming . . . . . . 9
- 2.1.5. Secure Transmission . . . . . . . . . . . . . . . . . 9
- 2.1.5.1. Safety . . . . . . . . . . . . . . . . . . . . . 9
+ 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 5
+ 2. Pro Audio and Video . . . . . . . . . . . . . . . . . . . . . 6
+ 2.1. Use Case Description . . . . . . . . . . . . . . . . . . 6
+ 2.1.1. Uninterrupted Stream Playback . . . . . . . . . . . . 7
+ 2.1.2. Synchronized Stream Playback . . . . . . . . . . . . 7
+ 2.1.3. Sound Reinforcement . . . . . . . . . . . . . . . . . 8
+ 2.1.4. Deterministic Time to Establish Streaming . . . . . . 8
+ 2.1.5. Secure Transmission . . . . . . . . . . . . . . . . . 8
+ 2.1.5.1. Safety . . . . . . . . . . . . . . . . . . . . . 8
2.2. Pro Audio Today . . . . . . . . . . . . . . . . . . . . . 9
- 2.3. Pro Audio Future . . . . . . . . . . . . . . . . . . . . 10
- 2.3.1. Layer 3 Interconnecting Layer 2 Islands . . . . . . . 10
- 2.3.2. High Reliability Stream Paths . . . . . . . . . . . . 10
- 2.3.3. Integration of Reserved Streams into IT Networks . . 10
- 2.3.4. Use of Unused Reservations by Best-Effort Traffic . . 11
- 2.3.5. Traffic Segregation . . . . . . . . . . . . . . . . . 11
- 2.3.5.1. Packet Forwarding Rules, VLANs and Subnets . . . 11
- 2.3.5.2. Multicast Addressing (IPv4 and IPv6) . . . . . . 12
- 2.3.6. Latency Optimization by a Central Controller . . . . 12
- 2.3.7. Reduced Device Cost Due To Reduced Buffer Memory . . 12
- 2.4. Pro Audio Asks . . . . . . . . . . . . . . . . . . . . . 13
- 3. Electrical Utilities . . . . . . . . . . . . . . . . . . . . 13
- 3.1. Use Case Description . . . . . . . . . . . . . . . . . . 13
- 3.1.1. Transmission Use Cases . . . . . . . . . . . . . . . 13
- 3.1.1.1. Protection . . . . . . . . . . . . . . . . . . . 13
- 3.1.1.2. Intra-Substation Process Bus Communications . . . 19
- 3.1.1.3. Wide Area Monitoring and Control Systems . . . . 20
+ 2.3. Pro Audio Future . . . . . . . . . . . . . . . . . . . . 9
+ 2.3.1. Layer 3 Interconnecting Layer 2 Islands . . . . . . . 9
+ 2.3.2. High Reliability Stream Paths . . . . . . . . . . . . 9
+ 2.3.3. Integration of Reserved Streams into IT Networks . . 9
+ 2.3.4. Use of Unused Reservations by Best-Effort Traffic . . 10
+ 2.3.5. Traffic Segregation . . . . . . . . . . . . . . . . . 10
+ 2.3.5.1. Packet Forwarding Rules, VLANs and Subnets . . . 10
+ 2.3.5.2. Multicast Addressing (IPv4 and IPv6) . . . . . . 11
+ 2.3.6. Latency Optimization by a Central Controller . . . . 11
+ 2.3.7. Reduced Device Cost Due To Reduced Buffer Memory . . 11
+ 2.4. Pro Audio Asks . . . . . . . . . . . . . . . . . . . . . 12
+ 3. Electrical Utilities . . . . . . . . . . . . . . . . . . . . 12
+ 3.1. Use Case Description . . . . . . . . . . . . . . . . . . 12
+ 3.1.1. Transmission Use Cases . . . . . . . . . . . . . . . 12
+ 3.1.1.1. Protection . . . . . . . . . . . . . . . . . . . 12
+ 3.1.1.2. Intra-Substation Process Bus Communications . . . 18
+ 3.1.1.3. Wide Area Monitoring and Control Systems . . . . 19
3.1.1.4. IEC 61850 WAN engineering guidelines requirement
- classification . . . . . . . . . . . . . . . . . 21
- 3.1.2. Generation Use Case . . . . . . . . . . . . . . . . . 22
- 3.1.2.1. Control of the Generated Power . . . . . . . . . 22
- 3.1.2.2. Control of the Generation Infrastructure . . . . 23
- 3.1.3. Distribution use case . . . . . . . . . . . . . . . . 28
+ classification . . . . . . . . . . . . . . . . . 20
+ 3.1.2. Generation Use Case . . . . . . . . . . . . . . . . . 21
+ 3.1.2.1. Control of the Generated Power . . . . . . . . . 21
+ 3.1.2.2. Control of the Generation Infrastructure . . . . 22
+ 3.1.3. Distribution use case . . . . . . . . . . . . . . . . 27
3.1.3.1. Fault Location Isolation and Service Restoration
- (FLISR) . . . . . . . . . . . . . . . . . . . . . 28
- 3.2. Electrical Utilities Today . . . . . . . . . . . . . . . 29
- 3.2.1. Security Current Practices and Limitations . . . . . 29
- 3.3. Electrical Utilities Future . . . . . . . . . . . . . . . 31
- 3.3.1. Migration to Packet-Switched Network . . . . . . . . 32
- 3.3.2. Telecommunications Trends . . . . . . . . . . . . . . 32
- 3.3.2.1. General Telecommunications Requirements . . . . . 32
+ (FLISR) . . . . . . . . . . . . . . . . . . . . . 27
+ 3.2. Electrical Utilities Today . . . . . . . . . . . . . . . 28
+ 3.2.1. Security Current Practices and Limitations . . . . . 28
+ 3.3. Electrical Utilities Future . . . . . . . . . . . . . . . 30
+ 3.3.1. Migration to Packet-Switched Network . . . . . . . . 31
+ 3.3.2. Telecommunications Trends . . . . . . . . . . . . . . 31
+ 3.3.2.1. General Telecommunications Requirements . . . . . 31
3.3.2.2. Specific Network topologies of Smart Grid
- Applications . . . . . . . . . . . . . . . . . . 33
- 3.3.2.3. Precision Time Protocol . . . . . . . . . . . . . 34
- 3.3.3. Security Trends in Utility Networks . . . . . . . . . 35
- 3.4. Electrical Utilities Asks . . . . . . . . . . . . . . . . 37
- 4. Building Automation Systems . . . . . . . . . . . . . . . . . 37
- 4.1. Use Case Description . . . . . . . . . . . . . . . . . . 37
- 4.2. Building Automation Systems Today . . . . . . . . . . . . 38
- 4.2.1. BAS Architecture . . . . . . . . . . . . . . . . . . 38
- 4.2.2. BAS Deployment Model . . . . . . . . . . . . . . . . 39
- 4.2.3. Use Cases for Field Networks . . . . . . . . . . . . 41
- 4.2.3.1. Environmental Monitoring . . . . . . . . . . . . 41
- 4.2.3.2. Fire Detection . . . . . . . . . . . . . . . . . 41
- 4.2.3.3. Feedback Control . . . . . . . . . . . . . . . . 42
- 4.2.4. Security Considerations . . . . . . . . . . . . . . . 42
- 4.3. BAS Future . . . . . . . . . . . . . . . . . . . . . . . 42
- 4.4. BAS Asks . . . . . . . . . . . . . . . . . . . . . . . . 43
- 5. Wireless for Industrial . . . . . . . . . . . . . . . . . . . 43
- 5.1. Use Case Description . . . . . . . . . . . . . . . . . . 43
- 5.1.1. Network Convergence using 6TiSCH . . . . . . . . . . 44
- 5.1.2. Common Protocol Development for 6TiSCH . . . . . . . 44
- 5.2. Wireless Industrial Today . . . . . . . . . . . . . . . . 45
- 5.3. Wireless Industrial Future . . . . . . . . . . . . . . . 45
- 5.3.1. Unified Wireless Network and Management . . . . . . . 45
- 5.3.1.1. PCE and 6TiSCH ARQ Retries . . . . . . . . . . . 47
- 5.3.2. Schedule Management by a PCE . . . . . . . . . . . . 48
- 5.3.2.1. PCE Commands and 6TiSCH CoAP Requests . . . . . . 48
- 5.3.2.2. 6TiSCH IP Interface . . . . . . . . . . . . . . . 49
- 5.3.3. 6TiSCH Security Considerations . . . . . . . . . . . 50
- 5.4. Wireless Industrial Asks . . . . . . . . . . . . . . . . 50
- 6. Cellular Radio . . . . . . . . . . . . . . . . . . . . . . . 50
- 6.1. Use Case Description . . . . . . . . . . . . . . . . . . 50
- 6.1.1. Network Architecture . . . . . . . . . . . . . . . . 50
- 6.1.2. Delay Constraints . . . . . . . . . . . . . . . . . . 51
- 6.1.3. Time Synchronization Constraints . . . . . . . . . . 53
- 6.1.4. Transport Loss Constraints . . . . . . . . . . . . . 55
- 6.1.5. Security Considerations . . . . . . . . . . . . . . . 55
- 6.2. Cellular Radio Networks Today . . . . . . . . . . . . . . 56
- 6.2.1. Fronthaul . . . . . . . . . . . . . . . . . . . . . . 56
- 6.2.2. Midhaul and Backhaul . . . . . . . . . . . . . . . . 56
- 6.3. Cellular Radio Networks Future . . . . . . . . . . . . . 57
- 6.4. Cellular Radio Networks Asks . . . . . . . . . . . . . . 59
- 7. Industrial M2M . . . . . . . . . . . . . . . . . . . . . . . 59
- 7.1. Use Case Description . . . . . . . . . . . . . . . . . . 59
- 7.2. Industrial M2M Communication Today . . . . . . . . . . . 60
- 7.2.1. Transport Parameters . . . . . . . . . . . . . . . . 61
- 7.2.2. Stream Creation and Destruction . . . . . . . . . . . 62
- 7.3. Industrial M2M Future . . . . . . . . . . . . . . . . . . 62
- 7.4. Industrial M2M Asks . . . . . . . . . . . . . . . . . . . 62
-
- 8. Mining Industry . . . . . . . . . . . . . . . . . . . . . . . 63
- 8.1. Use Case Description . . . . . . . . . . . . . . . . . . 63
- 8.2. Mining Industry Today . . . . . . . . . . . . . . . . . . 63
- 8.3. Mining Industry Future . . . . . . . . . . . . . . . . . 64
- 8.4. Mining Industry Asks . . . . . . . . . . . . . . . . . . 65
- 9. Private Blockchain . . . . . . . . . . . . . . . . . . . . . 65
- 9.1. Use Case Description . . . . . . . . . . . . . . . . . . 65
- 9.1.1. Blockchain Operation . . . . . . . . . . . . . . . . 65
- 9.1.2. Blockchain Network Architecture . . . . . . . . . . . 66
- 9.1.3. Security Considerations . . . . . . . . . . . . . . . 66
- 9.2. Private Blockchain Today . . . . . . . . . . . . . . . . 66
- 9.3. Private Blockchain Future . . . . . . . . . . . . . . . . 67
- 9.4. Private Blockchain Asks . . . . . . . . . . . . . . . . . 67
- 10. Network Slicing . . . . . . . . . . . . . . . . . . . . . . . 67
- 10.1. Use Case Description . . . . . . . . . . . . . . . . . . 67
- 10.2. Network Slicing Use Cases . . . . . . . . . . . . . . . 68
- 10.2.1. Enhanced Mobile Broadband (eMBB) . . . . . . . . . . 68
+ Applications . . . . . . . . . . . . . . . . . . 32
+ 3.3.2.3. Precision Time Protocol . . . . . . . . . . . . . 33
+ 3.3.3. Security Trends in Utility Networks . . . . . . . . . 34
+ 3.4. Electrical Utilities Asks . . . . . . . . . . . . . . . . 36
+ 4. Building Automation Systems . . . . . . . . . . . . . . . . . 36
+ 4.1. Use Case Description . . . . . . . . . . . . . . . . . . 36
+ 4.2. Building Automation Systems Today . . . . . . . . . . . . 37
+ 4.2.1. BAS Architecture . . . . . . . . . . . . . . . . . . 37
+ 4.2.2. BAS Deployment Model . . . . . . . . . . . . . . . . 38
+ 4.2.3. Use Cases for Field Networks . . . . . . . . . . . . 40
+ 4.2.3.1. Environmental Monitoring . . . . . . . . . . . . 40
+ 4.2.3.2. Fire Detection . . . . . . . . . . . . . . . . . 40
+ 4.2.3.3. Feedback Control . . . . . . . . . . . . . . . . 41
+ 4.2.4. Security Considerations . . . . . . . . . . . . . . . 41
+ 4.3. BAS Future . . . . . . . . . . . . . . . . . . . . . . . 41
+ 4.4. BAS Asks . . . . . . . . . . . . . . . . . . . . . . . . 42
+ 5. Wireless for Industrial . . . . . . . . . . . . . . . . . . . 42
+ 5.1. Use Case Description . . . . . . . . . . . . . . . . . . 42
+ 5.1.1. Network Convergence using 6TiSCH . . . . . . . . . . 43
+ 5.1.2. Common Protocol Development for 6TiSCH . . . . . . . 43
+ 5.2. Wireless Industrial Today . . . . . . . . . . . . . . . . 44
+ 5.3. Wireless Industrial Future . . . . . . . . . . . . . . . 44
+ 5.3.1. Unified Wireless Network and Management . . . . . . . 44
+ 5.3.1.1. PCE and 6TiSCH ARQ Retries . . . . . . . . . . . 46
+ 5.3.2. Schedule Management by a PCE . . . . . . . . . . . . 47
+ 5.3.2.1. PCE Commands and 6TiSCH CoAP Requests . . . . . . 47
+ 5.3.2.2. 6TiSCH IP Interface . . . . . . . . . . . . . . . 48
+ 5.3.3. 6TiSCH Security Considerations . . . . . . . . . . . 49
+ 5.4. Wireless Industrial Asks . . . . . . . . . . . . . . . . 49
+ 6. Cellular Radio . . . . . . . . . . . . . . . . . . . . . . . 49
+ 6.1. Use Case Description . . . . . . . . . . . . . . . . . . 49
+ 6.1.1. Network Architecture . . . . . . . . . . . . . . . . 49
+ 6.1.2. Delay Constraints . . . . . . . . . . . . . . . . . . 50
+ 6.1.3. Time Synchronization Constraints . . . . . . . . . . 52
+ 6.1.4. Transport Loss Constraints . . . . . . . . . . . . . 54
+ 6.1.5. Security Considerations . . . . . . . . . . . . . . . 54
+ 6.2. Cellular Radio Networks Today . . . . . . . . . . . . . . 55
+ 6.2.1. Fronthaul . . . . . . . . . . . . . . . . . . . . . . 55
+ 6.2.2. Midhaul and Backhaul . . . . . . . . . . . . . . . . 55
+ 6.3. Cellular Radio Networks Future . . . . . . . . . . . . . 56
+ 6.4. Cellular Radio Networks Asks . . . . . . . . . . . . . . 58
+ 7. Industrial M2M . . . . . . . . . . . . . . . . . . . . . . . 58
+ 7.1. Use Case Description . . . . . . . . . . . . . . . . . . 58
+ 7.2. Industrial M2M Communication Today . . . . . . . . . . . 59
+ 7.2.1. Transport Parameters . . . . . . . . . . . . . . . . 60
+ 7.2.2. Stream Creation and Destruction . . . . . . . . . . . 61
+ 7.3. Industrial M2M Future . . . . . . . . . . . . . . . . . . 61
+ 7.4. Industrial M2M Asks . . . . . . . . . . . . . . . . . . . 61
+ 8. Mining Industry . . . . . . . . . . . . . . . . . . . . . . . 62
+ 8.1. Use Case Description . . . . . . . . . . . . . . . . . . 62
+ 8.2. Mining Industry Today . . . . . . . . . . . . . . . . . . 62
+ 8.3. Mining Industry Future . . . . . . . . . . . . . . . . . 63
+ 8.4. Mining Industry Asks . . . . . . . . . . . . . . . . . . 64
+ 9. Private Blockchain . . . . . . . . . . . . . . . . . . . . . 64
+ 9.1. Use Case Description . . . . . . . . . . . . . . . . . . 64
+ 9.1.1. Blockchain Operation . . . . . . . . . . . . . . . . 64
+ 9.1.2. Blockchain Network Architecture . . . . . . . . . . . 65
+ 9.1.3. Security Considerations . . . . . . . . . . . . . . . 65
+ 9.2. Private Blockchain Today . . . . . . . . . . . . . . . . 65
+ 9.3. Private Blockchain Future . . . . . . . . . . . . . . . . 66
+ 9.4. Private Blockchain Asks . . . . . . . . . . . . . . . . . 66
+ 10. Network Slicing . . . . . . . . . . . . . . . . . . . . . . . 66
+ 10.1. Use Case Description . . . . . . . . . . . . . . . . . . 66
+ 10.2. Network Slicing Use Cases . . . . . . . . . . . . . . . 67
+ 10.2.1. Enhanced Mobile Broadband (eMBB) . . . . . . . . . . 67
10.2.2. Ultra-Reliable and Low Latency Communications
- (URLLC) . . . . . . . . . . . . . . . . . . . . . . 68
- 10.2.3. massive Machine Type Communications (mMTC) . . . . . 68
- 10.3. Using DetNet in Network Slicing . . . . . . . . . . . . 68
- 10.4. Network Slicing Today and Future . . . . . . . . . . . . 69
- 10.5. Network Slicing Asks . . . . . . . . . . . . . . . . . . 69
- 11. Use Case Common Themes . . . . . . . . . . . . . . . . . . . 69
- 11.1. Unified, standards-based network . . . . . . . . . . . . 69
- 11.1.1. Extensions to Ethernet . . . . . . . . . . . . . . . 69
- 11.1.2. Centrally Administered . . . . . . . . . . . . . . . 69
- 11.1.3. Standardized Data Flow Information Models . . . . . 70
- 11.1.4. L2 and L3 Integration . . . . . . . . . . . . . . . 70
- 11.1.5. Guaranteed End-to-End Delivery . . . . . . . . . . . 70
+ (URLLC) . . . . . . . . . . . . . . . . . . . . . . 67
+ 10.2.3. massive Machine Type Communications (mMTC) . . . . . 67
+ 10.3. Using DetNet in Network Slicing . . . . . . . . . . . . 67
+ 10.4. Network Slicing Today and Future . . . . . . . . . . . . 68
+ 10.5. Network Slicing Asks . . . . . . . . . . . . . . . . . . 68
+ 11. Use Case Common Themes . . . . . . . . . . . . . . . . . . . 68
+ 11.1. Unified, standards-based network . . . . . . . . . . . . 68
+ 11.1.1. Extensions to Ethernet . . . . . . . . . . . . . . . 68
+ 11.1.2. Centrally Administered . . . . . . . . . . . . . . . 68
+ 11.1.3. Standardized Data Flow Information Models . . . . . 69
+ 11.1.4. L2 and L3 Integration . . . . . . . . . . . . . . . 69
+ 11.1.5. Guaranteed End-to-End Delivery . . . . . . . . . . . 69
11.1.6. Replacement for Multiple Proprietary Deterministic
- Networks . . . . . . . . . . . . . . . . . . . . . . 70
- 11.1.7. Mix of Deterministic and Best-Effort Traffic . . . . 70
+ Networks . . . . . . . . . . . . . . . . . . . . . . 69
+ 11.1.7. Mix of Deterministic and Best-Effort Traffic . . . . 69
11.1.8. Unused Reserved BW to be Available to Best Effort
- Traffic . . . . . . . . . . . . . . . . . . . . . . 70
- 11.1.9. Lower Cost, Multi-Vendor Solutions . . . . . . . . . 71
- 11.2. Scalable Size . . . . . . . . . . . . . . . . . . . . . 71
- 11.3. Scalable Timing Parameters and Accuracy . . . . . . . . 71
- 11.3.1. Bounded Latency . . . . . . . . . . . . . . . . . . 71
- 11.3.2. Low Latency . . . . . . . . . . . . . . . . . . . . 71
- 11.3.3. Symmetrical Path Delays . . . . . . . . . . . . . . 72
- 11.4. High Reliability and Availability . . . . . . . . . . . 72
- 11.5. Security . . . . . . . . . . . . . . . . . . . . . . . . 72
- 11.6. Deterministic Flows . . . . . . . . . . . . . . . . . . 72
- 12. Use Cases Explicitly Out of Scope for DetNet . . . . . . . . 72
- 12.1. DetNet Scope Limitations . . . . . . . . . . . . . . . . 73
- 12.2. Internet-based Applications . . . . . . . . . . . . . . 73
- 12.2.1. Use Case Description . . . . . . . . . . . . . . . . 73
- 12.2.1.1. Media Content Delivery . . . . . . . . . . . . . 74
- 12.2.1.2. Online Gaming . . . . . . . . . . . . . . . . . 74
- 12.2.1.3. Virtual Reality . . . . . . . . . . . . . . . . 74
- 12.2.2. Internet-Based Applications Today . . . . . . . . . 74
- 12.2.3. Internet-Based Applications Future . . . . . . . . . 74
- 12.2.4. Internet-Based Applications Asks . . . . . . . . . . 74
- 12.3. Pro Audio and Video - Digital Rights Management (DRM) . 75
- 12.4. Pro Audio and Video - Link Aggregation . . . . . . . . . 75
- 13. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 76
- 13.1. Pro Audio . . . . . . . . . . . . . . . . . . . . . . . 76
- 13.2. Utility Telecom . . . . . . . . . . . . . . . . . . . . 76
- 13.3. Building Automation Systems . . . . . . . . . . . . . . 76
- 13.4. Wireless for Industrial . . . . . . . . . . . . . . . . 76
- 13.5. Cellular Radio . . . . . . . . . . . . . . . . . . . . . 77
- 13.6. Industrial M2M . . . . . . . . . . . . . . . . . . . . . 77
- 13.7. Internet Applications and CoMP . . . . . . . . . . . . . 77
- 13.8. Electrical Utilities . . . . . . . . . . . . . . . . . . 77
- 13.9. Network Slicing . . . . . . . . . . . . . . . . . . . . 77
- 13.10. Mining . . . . . . . . . . . . . . . . . . . . . . . . . 77
- 13.11. Private Blockchain . . . . . . . . . . . . . . . . . . . 77
- 14. Informative References . . . . . . . . . . . . . . . . . . . 77
- Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 87
+ Traffic . . . . . . . . . . . . . . . . . . . . . . 69
+ 11.1.9. Lower Cost, Multi-Vendor Solutions . . . . . . . . . 70
+ 11.2. Scalable Size . . . . . . . . . . . . . . . . . . . . . 70
+ 11.3. Scalable Timing Parameters and Accuracy . . . . . . . . 70
+ 11.3.1. Bounded Latency . . . . . . . . . . . . . . . . . . 70
+ 11.3.2. Low Latency . . . . . . . . . . . . . . . . . . . . 70
+ 11.3.3. Symmetrical Path Delays . . . . . . . . . . . . . . 71
+ 11.4. High Reliability and Availability . . . . . . . . . . . 71
+ 11.5. Security . . . . . . . . . . . . . . . . . . . . . . . . 71
+ 11.6. Deterministic Flows . . . . . . . . . . . . . . . . . . 71
+ 12. Use Cases Explicitly Out of Scope for DetNet . . . . . . . . 71
+ 12.1. DetNet Scope Limitations . . . . . . . . . . . . . . . . 72
+ 12.2. Internet-based Applications . . . . . . . . . . . . . . 72
+ 12.2.1. Use Case Description . . . . . . . . . . . . . . . . 72
+ 12.2.1.1. Media Content Delivery . . . . . . . . . . . . . 73
+ 12.2.1.2. Online Gaming . . . . . . . . . . . . . . . . . 73
+ 12.2.1.3. Virtual Reality . . . . . . . . . . . . . . . . 73
+ 12.2.2. Internet-Based Applications Today . . . . . . . . . 73
+ 12.2.3. Internet-Based Applications Future . . . . . . . . . 73
+ 12.2.4. Internet-Based Applications Asks . . . . . . . . . . 73
+ 12.3. Pro Audio and Video - Digital Rights Management (DRM) . 74
+ 12.4. Pro Audio and Video - Link Aggregation . . . . . . . . . 74
+ 13. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 75
+ 14. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 76
+ 14.1. Pro Audio . . . . . . . . . . . . . . . . . . . . . . . 76
+ 14.2. Utility Telecom . . . . . . . . . . . . . . . . . . . . 77
+ 14.3. Building Automation Systems . . . . . . . . . . . . . . 77
+ 14.4. Wireless for Industrial . . . . . . . . . . . . . . . . 77
+ 14.5. Cellular Radio . . . . . . . . . . . . . . . . . . . . . 77
+ 14.6. Industrial M2M . . . . . . . . . . . . . . . . . . . . . 77
+ 14.7. Internet Applications and CoMP . . . . . . . . . . . . . 78
+ 14.8. Electrical Utilities . . . . . . . . . . . . . . . . . . 78
+ 14.9. Network Slicing . . . . . . . . . . . . . . . . . . . . 78
+ 14.10. Mining . . . . . . . . . . . . . . . . . . . . . . . . . 78
+ 14.11. Private Blockchain . . . . . . . . . . . . . . . . . . . 78
+ 15. Informative References . . . . . . . . . . . . . . . . . . . 78
+ Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 88
1. Introduction
This draft presents use cases from diverse industries which have in
common a need for deterministic streams, but which also differ
notably in their network topologies and specific desired behavior.
Together, they provide broad industry context for DetNet and a
yardstick against which proposed DetNet designs can be measured (to
what extent does a proposed design satisfy these various use cases?)
@@ -1927,21 +1893,21 @@
In this use case we focus on one specific wireless network technology
which does provide the required deterministic QoS, which is "IPv6
over the TSCH mode of IEEE 802.15.4e" (6TiSCH, where TSCH stands for
"Time-Slotted Channel Hopping", see [I-D.ietf-6tisch-architecture],
[IEEE802154], [IEEE802154e], and [RFC7554]).
There are other deterministic wireless busses and networks available
today, however they are imcompatible with each other, and
incompatible with IP traffic (for example [ISA100], [WirelessHART]).
- Thus the primary goal of this use case is to apply 6TiSH as a
+ Thus the primary goal of this use case is to apply 6TiSCH as a
converged IP- and standards-based wireless network for industrial
applications, i.e. to replace multiple proprietary and/or
incompatible wireless networking and wireless network management
standards.
5.1.2. Common Protocol Development for 6TiSCH
Today there are a number of protocols required by 6TiSCH which are
still in development, and a second intent of this use case is to
highlight the ways in which these "missing" protocols share goals in
@@ -3415,108 +3381,191 @@
with the core goal of achieving the lowest possible latency.
For transmitting streams that require more bandwidth than a single
link in the target network can support, link aggregation is a
technique for combining (aggregating) the bandwidth available on
multiple physical links to create a single logical link of the
required bandwidth. However, if aggregation is to be used, the
network controller (or equivalent) must be able to determine the
maximum latency of any path through the aggregate link.
-13. Acknowledgments
+13. Contributors
-13.1. Pro Audio
+ RFC7322 limits the number of authors listed on the front page of a
+ draft to a maximum of 5, far fewer than the 20 individuals below who
+ made important contributions to this draft. The editor wishes to
+ thank and acknowledge each of the following authors for contributing
+ text to this draft. See also Section 14.
+
+ Craig Gunther (Harman International)
+ 10653 South River Front Parkway, South Jordan,UT 84095
+ phone +1 801 568-7675, email craig.gunther@harman.com
+
+ Pascal Thubert (Cisco Systems, Inc)
+ Building D, 45 Allee des Ormes - BP1200, MOUGINS
+ Sophia Antipolis 06254 FRANCE
+ phone +33 497 23 26 34, email pthubert@cisco.com
+
+ Patrick Wetterwald (Cisco Systems)
+ 45 Allees des Ormes, Mougins, 06250 FRANCE
+ phone +33 4 97 23 26 36, email pwetterw@cisco.com
+
+ Jean Raymond (Hydro-Quebec)
+ 1500 University, Montreal, H3A3S7, Canada
+ phone +1 514 840 3000, email raymond.jean@hydro.qc.ca
+
+ Jouni Korhonen (Broadcom Corporation)
+ 3151 Zanker Road, San Jose, 95134, CA, USA
+ email jouni.nospam@gmail.com
+
+ Yu Kaneko (Toshiba)
+ 1 Komukai-Toshiba-cho, Saiwai-ku, Kasasaki-shi, Kanagawa, Japan
+ email yu1.kaneko@toshiba.co.jp
+
+ Subir Das (Applied Communication Sciences)
+ 150 Mount Airy Road, Basking Ridge, New Jersey, 07920, USA
+ email sdas@appcomsci.com
+
+ Yiyong Zha (Huawei Technologies)
+ email
+
+ Balazs Varga (Ericsson)
+ Konyves Kalman krt. 11/B, Budapest, Hungary, 1097
+ email balazs.a.varga@ericsson.com
+
+ Janos Farkas (Ericsson)
+ Konyves Kalman krt. 11/B, Budapest, Hungary, 1097
+ email janos.farkas@ericsson.com
+ Franz-Josef Goetz (Siemens)
+ Gleiwitzerstr. 555, Nurnberg, Germany, 90475
+ email franz-josef.goetz@siemens.com
+
+ Juergen Schmitt (Siemens)
+ Gleiwitzerstr. 555, Nurnberg, Germany, 90475
+ email juergen.jues.schmitt@siemens.com
+
+ Xavier Vilajosana (Worldsensing)
+ 483 Arago, Barcelona, Catalonia, 08013, Spain
+ email xvilajosana@worldsensing.com
+
+ Toktam Mahmoodi (King's College London)
+ Strand, London WC2R 2LS, United Kingdom
+ email toktam.mahmoodi@kcl.ac.uk
+
+ Spiros Spirou (Intracom Telecom)
+ 19.7 km Markopoulou Ave., Peania, Attiki, 19002, Greece
+ email spiros.spirou@gmail.com
+
+ Petra Vizarreta (Technical University of Munich)
+ Maxvorstadt, ArcisstraBe 21, Munich, 80333, Germany
+ email petra.stojsavljevic@tum.de
+
+ Daniel Huang (ZTE Corporation, Inc.)
+ No. 50 Software Avenue, Nanjing, Jiangsu, 210012, P.R. China
+ email huang.guangping@zte.com.cn
+
+ Xuesong Geng (Huawei Technologies)
+ email gengxuesong@huawei.com
+
+ Diego Dujovne (Universidad Diego Portales)
+ email diego.dujovne@mail.udp.cl
+
+ Maik Seewald (Cisco Systems)
+ email maseewal@cisco.com
+
+14. Acknowledgments
+
+14.1. Pro Audio
This section was derived from draft-gunther-detnet-proaudio-req-01.
The editors would like to acknowledge the help of the following
individuals and the companies they represent:
Jeff Koftinoff, Meyer Sound
-
Jouni Korhonen, Associate Technical Director, Broadcom
Pascal Thubert, CTAO, Cisco
Kieran Tyrrell, Sienda New Media Technologies GmbH
-13.2. Utility Telecom
+14.2. Utility Telecom
This section was derived from draft-wetterwald-detnet-utilities-reqs-
02.
Faramarz Maghsoodlou, Ph. D. IoT Connected Industries and Energy
Practice Cisco
Pascal Thubert, CTAO Cisco
-13.3. Building Automation Systems
+14.3. Building Automation Systems
This section was derived from draft-bas-usecase-detnet-00.
-13.4. Wireless for Industrial
+14.4. Wireless for Industrial
This section was derived from draft-thubert-6tisch-4detnet-01.
This specification derives from the 6TiSCH architecture, which is the
result of multiple interactions, in particular during the 6TiSCH
(bi)Weekly Interim call, relayed through the 6TiSCH mailing list at
the IETF.
The authors wish to thank: Kris Pister, Thomas Watteyne, Xavier
Vilajosana, Qin Wang, Tom Phinney, Robert Assimiti, Michael
Richardson, Zhuo Chen, Malisa Vucinic, Alfredo Grieco, Martin Turon,
Dominique Barthel, Elvis Vogli, Guillaume Gaillard, Herman Storey,
Maria Rita Palattella, Nicola Accettura, Patrick Wetterwald, Pouria
Zand, Raghuram Sudhaakar, and Shitanshu Shah for their participation
and various contributions.
-13.5. Cellular Radio
+14.5. Cellular Radio
This section was derived from draft-korhonen-detnet-telreq-00.
-13.6. Industrial M2M
+14.6. Industrial M2M
The authors would like to thank Feng Chen and Marcel Kiessling for
their comments and suggestions.
-13.7. Internet Applications and CoMP
+14.7. Internet Applications and CoMP
This section was derived from draft-zha-detnet-use-case-00.
This document has benefited from reviews, suggestions, comments and
proposed text provided by the following members, listed in
alphabetical order: Jing Huang, Junru Lin, Lehong Niu and Oilver
Huang.
-13.8. Electrical Utilities
+14.8. Electrical Utilities
The wind power generation use case has been extracted from the study
of Wind Farms conducted within the 5GPPP Virtuwind Project. The
project is funded by the European Union's Horizon 2020 research and
innovation programme under grant agreement No 671648 (VirtuWind).
-13.9. Network Slicing
+14.9. Network Slicing
This section was written by Xuesong Geng, who would like to
acknowledge Norm Finn and Mach Chen for their useful comments.
-13.10. Mining
+14.10. Mining
This section was written by Diego Dujovne in conjunction with Xavier
Vilasojana.
-13.11. Private Blockchain
+14.11. Private Blockchain
This section was written by Daniel Huang.
-14. Informative References
+15. Informative References
[ACE] IETF, "Authentication and Authorization for Constrained
Environments",
.
[Ahm14] Ahmed, M. and R. Kim, "Communication network architectures
for smart-wind power farms.", Energies, p. 3900-3921. ,
June 2014.
[bacnetip]
@@ -3585,22 +3634,22 @@
Statement", draft-finn-detnet-problem-statement-05 (work
in progress), March 2016.
[I-D.ietf-6tisch-6top-interface]
Wang, Q. and X. Vilajosana, "6TiSCH Operation Sublayer
(6top) Interface", draft-ietf-6tisch-6top-interface-04
(work in progress), July 2015.
[I-D.ietf-6tisch-architecture]
Thubert, P., "An Architecture for IPv6 over the TSCH mode
- of IEEE 802.15.4", draft-ietf-6tisch-architecture-12 (work
- in progress), August 2017.
+ of IEEE 802.15.4", draft-ietf-6tisch-architecture-13 (work
+ in progress), November 2017.
[I-D.ietf-6tisch-coap]
Sudhaakar, R. and P. Zand, "6TiSCH Resource Management and
Interaction using CoAP", draft-ietf-6tisch-coap-03 (work
in progress), March 2015.
[I-D.ietf-6tisch-terminology]
Palattella, M., Thubert, P., Watteyne, T., and Q. Wang,
"Terminology in IPv6 over the TSCH mode of IEEE
802.15.4e", draft-ietf-6tisch-terminology-09 (work in
@@ -3965,169 +4014,21 @@
Applications over the Network", The 7th International
Symposium on VICTORIES Project PetrHolub_presentation,
October 2014, .
[WirelessHART]
www.hartcomm.org, "Industrial Communication Networks -
Wireless Communication Network and Communication Profiles
- WirelessHART - IEC 62591", 2010.
-Authors' Addresses
+Author's Address
Ethan Grossman (editor)
Dolby Laboratories, Inc.
1275 Market Street
San Francisco, CA 94103
USA
Phone: +1 415 645 4726
Email: ethan.grossman@dolby.com
URI: http://www.dolby.com
- Craig Gunther
- Harman International
- 10653 South River Front Parkway
- South Jordan, UT 84095
- USA
-
- Phone: +1 801 568-7675
- Email: craig.gunther@harman.com
- URI: http://www.harman.com
-
- Pascal Thubert
- Cisco Systems, Inc
- Building D
- 45 Allee des Ormes - BP1200
- MOUGINS - Sophia Antipolis 06254
- FRANCE
-
- Phone: +33 497 23 26 34
- Email: pthubert@cisco.com
-
- Patrick Wetterwald
- Cisco Systems
- 45 Allees des Ormes
- Mougins 06250
- FRANCE
-
- Phone: +33 4 97 23 26 36
- Email: pwetterw@cisco.com
-
- Jean Raymond
- Hydro-Quebec
- 1500 University
- Montreal H3A3S7
- Canada
-
- Phone: +1 514 840 3000
- Email: raymond.jean@hydro.qc.ca
- Jouni Korhonen
- Broadcom Corporation
- 3151 Zanker Road
- San Jose, CA 95134
- USA
-
- Email: jouni.nospam@gmail.com
-
- Yu Kaneko
- Toshiba
- 1 Komukai-Toshiba-cho, Saiwai-ku, Kasasaki-shi
- Kanagawa, Japan
-
- Email: yu1.kaneko@toshiba.co.jp
-
- Subir Das
- Applied Communication Sciences
- 150 Mount Airy Road, Basking Ridge
- New Jersey, 07920, USA
-
- Email: sdas@appcomsci.com
-
- Yiyong Zha
- Huawei Technologies
-
- Email: zhayiyong@huawei.com
-
- Balazs Varga
- Ericsson
- Konyves Kalman krt. 11/B
- Budapest 1097
- Hungary
-
- Email: balazs.a.varga@ericsson.com
-
- Janos Farkas
- Ericsson
- Konyves Kalman krt. 11/B
- Budapest 1097
- Hungary
-
- Email: janos.farkas@ericsson.com
- Franz-Josef Goetz
- Siemens
- Gleiwitzerstr. 555
- Nurnberg 90475
- Germany
-
- Email: franz-josef.goetz@siemens.com
-
- Juergen Schmitt
- Siemens
- Gleiwitzerstr. 555
- Nurnberg 90475
- Germany
-
- Email: juergen.jues.schmitt@siemens.com
-
- Xavier Vilajosana
- Worldsensing
- 483 Arago
- Barcelona, Catalonia 08013
- Spain
-
- Email: xvilajosana@worldsensing.com
-
- Toktam Mahmoodi
- King's College London
- Strand, London WC2R 2LS
- London, London WC2R 2LS
- United Kingdom
-
- Email: toktam.mahmoodi@kcl.ac.uk
-
- Spiros Spirou
- Intracom Telecom
- 19.7 km Markopoulou Ave.
- Peania, Attiki 19002
- Greece
-
- Email: spis@intracom-telecom.com
- Petra Vizarreta
- Technical University of Munich, TUM
- Maxvorstadt, ArcisstraBe 21
- Munich, Germany 80333
- Germany
-
- Email: petra.vizarreta@lkn.ei.tum.de
-
- Daniel Huang
- ZTE Corporation, Inc.
- No. 50 Software Avenue
- Nanjing, Jiangsu 210012
- P.R. China
-
- Email: huang.guangping@zte.com.cn
-
- Xuesong Geng
- Huawei Technologies
-
- Email: gengxuesong@huawei.com
-
- Diego Dujovne
- Universidad Diego Portales
-
- Email: diego.dujovne@mail.udp.cl
-
- Maik Seewald
- Cisco Systems
-
- Email: maseewal@cisco.com